EP1341350B1 - A method for congestion detection for IP flows over a wireless network - Google Patents
A method for congestion detection for IP flows over a wireless network Download PDFInfo
- Publication number
- EP1341350B1 EP1341350B1 EP02003558A EP02003558A EP1341350B1 EP 1341350 B1 EP1341350 B1 EP 1341350B1 EP 02003558 A EP02003558 A EP 02003558A EP 02003558 A EP02003558 A EP 02003558A EP 1341350 B1 EP1341350 B1 EP 1341350B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- network
- peer
- congestion
- packet
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000001514 detection method Methods 0.000 title claims description 45
- 238000000034 method Methods 0.000 title claims description 30
- 230000007246 mechanism Effects 0.000 claims description 42
- 230000005540 biological transmission Effects 0.000 claims description 23
- 230000003044 adaptive effect Effects 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 13
- 238000005516 engineering process Methods 0.000 claims description 9
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 5
- 238000013459 approach Methods 0.000 description 30
- 230000001934 delay Effects 0.000 description 11
- 238000013467 fragmentation Methods 0.000 description 11
- 238000006062 fragmentation reaction Methods 0.000 description 11
- 239000000872 buffer Substances 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 230000006978 adaptation Effects 0.000 description 6
- 230000006399 behavior Effects 0.000 description 6
- 238000005259 measurement Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 4
- 239000012634 fragment Substances 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000001771 impaired effect Effects 0.000 description 2
- 230000001617 migratory effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 238000010791 quenching Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000002459 sustained effect Effects 0.000 description 2
- 230000008685 targeting Effects 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- VKEQBMCRQDSRET-UHFFFAOYSA-N Methylone Chemical compound CNC(C)C(=O)C1=CC=C2OCOC2=C1 VKEQBMCRQDSRET-UHFFFAOYSA-N 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000009349 indirect transmission Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 239000012464 large buffer Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000011144 upstream manufacturing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/18—End to end
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/28—Flow control; Congestion control in relation to timing considerations
- H04L47/283—Flow control; Congestion control in relation to timing considerations in response to processing delays, e.g. caused by jitter or round trip time [RTT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/80—Responding to QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0284—Traffic management, e.g. flow control or congestion control detecting congestion or overload during communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/0289—Congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W56/00—Synchronisation arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access
Definitions
- the underlying invention generally relates to the field of mobile computing and/or communication in a heterogeneous network environment with distributed multimedia applications and technologies for high-speed data transfer. More specifically, the invention is directed to the field of Quality-of-Service (QoS) management for adaptive real-time (RT) services running on mobile terminals that support different access technologies for dynamic wire-bound and wireless networks based f.e. on the Transmission Control Protocol (TCP), the Internet Protocol (IP), the Real-Time Transport Protocol (RTP), and/or the User Datagram Protocol (UDP), respectively.
- QoS Quality-of-Service
- RT real-time
- TCP Transmission Control Protocol
- IP Internet Protocol
- RTP Real-Time Transport Protocol
- UDP User Datagram Protocol
- QoS management is a critical issue for the future multiple-serviced Internet. Thereby, an important aspect is how to effectively control network congestions. Presently, new mechanisms beyond end-to-end control are explored to support the evolution of network services. In this connection, the combination of node-to-node control and network-state-dependent packet scheduling is a promising approach.
- congestion management which includes congestion detection, control and avoidance mechanisms in connectionless and packet-switched dynamic WANs with high-speed access such as the Internet.
- congestion management includes congestion detection, control and avoidance mechanisms in connectionless and packet-switched dynamic WANs with high-speed access such as the Internet.
- the Internet does not offer any QoS guarantees or support to multimedia applications such as Internet telephony and video conferencing. Consequently, the performance of all these applications may seriously be impaired by network congestion.
- a media source in the network can not reserve bandwidth across the network to its destination. Therefore, it is unable to determine what data rate can be sustained between it and the destination.
- a media source transmits data at a rate which is too high to be sustained between it and the destination
- one or more routers will begin to queue the packets in their buffers. If the queuing continues, the buffers will become full and packets from the source will be discarded, which causes data loss. If the source attempts to guarantee transmission reliability, retransmission of data and increased transmission time between the source and the destination is the result.
- the throughput increases linearly.
- the buffers in the routers begin to fill. This increases the response time (the time for said data to traverse the network between the source and the destination) and lowers the throughput.
- the response time the time for said data to traverse the network between the source and the destination
- packet loss occurs. Increases in load beyond this point increase the probability of packet loss.
- response time approaches infinity and the throughput approaches zero; this is the point of congestion collapse due to the extreme drop in throughput.
- a large buffer space does not help to solve the problem of network congestion; this only postpones the inevitable packet loss when network load is larger than network capacity.
- Slow links by themselves do not cause congestion, but the mismatch of network link speeds helps cause congestion.
- slow processors do not cause congestion.
- the introduction of a high-speed processor in an existing network may actually increase the mismatch of processing speeds and the chances of congestion. In fact, congestion occurs even if all links and processors work with the same speed.
- gateways are often designed with large maximum queues to accommodate transient congestion.
- the TCP detects congestions only after a packet has been dropped at the gateway.
- the most effective congestion detection can be performed in the gateway itself.
- the gateway can reliably distinguish between propagation delay and persistent queuing delay, and it has a unified view of the queuing behavior over time.
- a gateway is shared by many active connections with a wide range of round-trip times, tolerances of delay, throughput requirements, etc.; decisions about the duration and magnitude of transient congestion to be allowed at the gateway are best made by the gateway itself.
- the method of monitoring the average queue size at the gateway and of notifying connections of incipient congestion is based on the assumption that it is useful to have queues at the gateway where traffic from a number of connections is multiplexed together by means of a First-In-First-Out (FIFO) scheduling.
- FIFO scheduling is not only useful for sharing delay among connections, reducing delay for a particular connection during its periods of burstiness, but it also scales well and is easy to implement efficiently.
- IP stream traverses wire-bound and wireless networks
- congestion detection and control of said IP stream is always difficult because presently available congestion detection mechanisms are based on measurements of packet loss detected by time-outs.
- this is not feasible for wireless networks, because some of them (e.g. the General Packet Radio Service, GPRS) involve high packet loss and varying latencies without being actually congested.
- GPRS General Packet Radio Service
- UDP offers no QoS control mechanisms and can therefore not guarantee any level of QoS. For this reason, said multimedia applications do not respond to notifications of congestion from the underlying network. Hence, these applications may severely overload the underlying network and starve other applications. Fluctuations of network conditions combined with the inability of TCP and UDP to support QoS control often render multimedia applications useless. In addition, deploying non-congestion-controlled UDP traffic results in extreme unfairness towards competing TCP traffic. Sending best-effort traffic without any consideration of the network congestion state can easily result in packet losses.
- TCP connections which constitute around 95 % of the Internet traffic today, would reduce their transmission rates. However, without any rate reduction on behalf of the non-congestion-controlled traffic, the TCP connections would starve and receive much less than their fair bandwidth shares. Therefore, UDP sources need to be enhanced with congestion control schemes that do not only aim at reducing loss ratios and improve bandwidth utilization but are also fair towards competing TCP connections ("TCP-friendly").
- An important gateway mechanism for congestion control is packet scheduling. It can determine the way in which different flows interact with each other, and thus affect the collective traffic behaviors in the router. It allocates three quantities for a flow, bandwidth, promptness, and buffer space. In a multiple service environment, it can guarantee fairness and transmission rate for a particular flow. Owing to the advantages of packet scheduling, it has been implemented in cutting-edge IP routers of many providers. Based on both the theoretical and practical research on packet scheduling, it can be made adaptive to network state. At an,instant it may allocate more bandwidth to a flow to be congested than its share while limiting bandwidth shares of flows not to be congested. In this way, loss of packets can be reduced and network utility and performance can be improved.
- the packet scheduler monitors and controls flows directly, it is able to exploit the packet level utility further. Close coordination among routers and between the router and the host can also enhance congestion control. If downstream links notify upstream packet schedulers of the congestion status, traffic behaviors of flows can be better controlled.
- the packet scheduler can also do smart marking on packets according to different policies so as to inform the sources to adjust sending rates in a network-dependent fashion. This close coordination between the network and the sources can optimize bandwidth sharing among flows dynamically. Meanwhile, it can limit the amount of traffic entering the network in time efficiently.
- Pricing has a twofold effect on congestion control. To the host, it provides an incentive for users to limit their usage of the network resource and adapt their applications to network congestion. In principle, this,can limit the amount of traffic of a flow entering the network and thus help control congestion. To the network, a price-driven scheduling can lead to a more efficient use of scarce resources (bandwidth). It can be assumed that the willingness of payment reflects certain aspects of the quality requirement of a user for its applications. Users who are willing to pay more should get better service at congestion. The pricing adds a new and important dimension for resource allocation and fairness guarantee.
- RED Random Early Detection
- TCP transport layer congestion control protocols
- a RED gateway notifies connections of congestion either by dropping packets that arrive at the RED gateway or by setting a bit in the packet headers. It detects incipient congestion by computing the average queue size q ⁇ .
- a low-pass filter with an exponential weighted moving average is used. Then, q ⁇ is compared with two preset thresholds, a minimum threshold q min and a maximum threshold q max .
- DECbit gateways set the congestion indication bit in each arriving packet if the average queue size exceeds a preset threshold.
- the ultimate object of any congestion detection and control scheme is to reduce network load to a sustainable value.
- Simplistic schemes such as Source Quench only inform a data source of the existence of congestion within the network; no other information can be deduced.
- Protocols such as DECbit are an improvement of Source Quench in terms of their detection of congestion and the return of this information to the sources.
- DECbit are an improvement of Source Quench in terms of their detection of congestion and the return of this information to the sources.
- Schemes like RED while admirable in attempting to address the problems of end-to-end congestion control, can only indicate congestion by dropping packets, which should not be discarded unless absolutely necessary.
- congestion control schemes in which network components such as routers are involved are supposed to be more effective than pure end-to-end congestion control schemes. As most network congestion occurs in routers, they are in an ideal position to monitor network load and congestion and to use this information in a congestion detection and control scheme. Thereby, network-based congestion detection and control schemes are able to feedback congestion data to the transmitting media sources, thus directly altering their behavior. Alternatively, network-based schemes can change the packet processing within routers. This can help alleviate congestion, and may also indirectly affect the behavior of media sources.
- a fixed node A (the media source 102a) is situated somewhere in a fixed network 106a (e.g. in the Internet); the mobile node B (the data sink 102b) is attached to said fixed network 106a over a wireless mobile network 106b (e.g. via GPRS).
- a wireless mobile network 106b e.g. via GPRS
- an IP packet which is sent from the source 102a to the sink 102b is conveyed by a number of fixed network links and routers, until it reaches the router between the fixed network 106a and the wireless network 106b - the base station 104. From there, it is conveyed to the mobile node B via a wireless link.
- the focus shall be on UDP traffic, especially on multimedia streams using RTP on the basis of UDP.
- the scenario 100 described above is a typical scenario for mobile multimedia applications such as Video-on-Demand (VoD).
- the client located on peer B is accessing multimedia data which are available at peer A.
- multimedia streams are traversing the fixed network 106a and the mobile network 106b from peer A to peer B. Therefore, peer A is called the source 102a and peer B the sink 102b of such a multimedia stream.
- Congestion detection 206 is needed for a lot of issues, in particular
- the proposed solution according to the underlying invention is based on a congestion detection 206 by observing packet delays.
- the basic issue here is to analyze whether there is a "sudden increase" in the sequence of observed packet delays from the source 102a to the sink 102b.
- This approach is quite similar to the observation of packet inter-arrival times, which has been discussed in “Estimating the Available Bandwidth for Real-Time Traffic over Best-Effort Networks” (in: W. Dabbous and C. Diot (editors), “Proceedings of the 5 th Workshop on Protocols for High-Speed Networks", France, 1996, Chapman & Hall, pp. 3-12) by F. Davoli, O. Khan, and P. Maryni.
- the problem with the inter-arrival times is that the packet sequence in mobile networks and internetworks can be severely distorted.
- the herein proposed solution is partly solving this issue as it allows performing a congestion detection 206 separately on the fixed part 106a and the wireless part 106b of the route.
- DMSs Distributed Multimedia Systems
- the proposed solution according to the underlying invention is basically dedicated to a method for detecting network congestions in fixed networks based on the Internet Protocol (IP), especially for multimedia streams of applications using RTP packets carried by UDP packets, targeting to support distributed multimedia applications to dynamically adapt to varying resource availability.
- IP Internet Protocol
- This method is based on adding time stamps to the IP packets and performing the congestion detection based on the observation of packet delays.
- the independent claim 1 and the dependent claims 2 to 9 are directed to methods used for the detection, analysis and/or adaptive control of network congestions along the communication path used for continuous media streams transmitted between two peers in a (heterogeneous) network environment with distributed adaptive multimedia applications and services being able to dynamically adapt to varying resource availability by evaluating time differences of two or more time stamps added to each data packet of said media streams.
- said network environment comprises at least one base station serving as a router for the communication link between said peers, at least one connectionless and packet-switched wire-bound datagram network for the transmission of said data packets between the first peer, which serves as a media source, and said base station, and at least one wireless network for the transmission of said data packets between said base station and the second peer, which serves as a media sink.
- said time stamps are added to said data packets by the first peer and/or the base station and evaluated by the second peer in order to observe the packet delay said data packets encounter on the path through the wire-bound datagram network between the first peer and the base station for getting a qualitative status information of said wire-bound datagram network.
- the independent claim 10 pertains to a mobile terminal configured for performing a method according to claim 1 to 4.
- independent claims 12 and claim 11 refer to a base station and a scheduler framework implemented in said base station which serves as an active node for enabling an adaptive allocation of bandwidth and/or an adaptive scheduling of data packets to be transmitted through said wire-bound datagram network depending on the current congestion state of said network by applying a method according to anyone of the claims 1 to 9.
- the independent claims 13 and 14 pertain to a software program and an extension of a communication protocol providing a guaranteed end-to-end quality for a telecommunication session between two peers that realize a method according to anyone of the claims 1 to 9 when executed by the central processing unit of the second peer.
- the network architecture of the wire-bound network 106a features the following characteristics:
- the network 106a is packet-switched. Packets 202a-e and/or 302a-e are individually routed from the source 102a to the destination 102b. They may take different routes, and may arrive at the destination 102b out-of-order.
- the main idea for the congestion detection 206 shown'in scenario 200 comprises the following steps:
- UDP always refers to UDP datagrams 202a-e that are encapsulated into an IP datagram.
- the IP datagrams are left out.
- the first step can be omitted since RTP packets 302a-e are already marked with a time stamp 204a (TS1) by the sender 102a. Therefore, if this mechanism is only applied for RTP streams 302a-e, there is no need to make any changes to the source 102a.
- TS1 time stamp 204a
- RTP time stamps 204a
- RTP is mentioned here because it is a proposed Internet standard and widely used in the Internet as described in "RTP: A Transport Protocol for Real-Time Applications” (IETF Request for Comments (RFC) 1889 (proposed standard), Internet Engineering Task Force, Jan. 1996) by H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson.
- time stamps 204a (TS1), it is then possible to observe the delay a packet encounters on the path through the fixed network 106a from the source 102a to the base station 104.
- the observation of the packet delay in this "fixed-network part" 106a of the path from the source 102a to the sink 102b can be used for a qualitative network status information of the path 106a from the source 102a to base station 104, e.g. for an estimation whether the fixed network 106a is currently congested or not.
- Such a congestion detection 206 is performed by using the same algorithms as used by the inter-arrival time approaches, however, it is now based on the measured packet delays on the fixed network 106a, and the wireless network 106b can be measured separately. Therefore, the congestion detection 206 can work on the "fixed-network part" 106a without taking the (problematic) "wireless-network part” 106b into account.
- the network status and the available bandwidth on the other part of the path from the base station 104 to the sink 102b is often determined by negotiation between the sink 102b and the network operator.
- Time stamps 204a+b are only added to IP packets. There is no need to add any time stamps in RTP packets 302a-e, because RTP datagrams 302a-e contain a time stamp 204a by definition. Said RTP datagrams consist of a header 400 followed by the RTP payload. The structure of the RTP header 400 can be taken from Fig. 4.
- Each sender of an RTP datagram 302a-e is obliged to fill in the time-stamp 204a into the respective RTP packet 302a-e as prescribed by the specification of RTP.
- IP datagrams Adding time stamps 204a+b to IP datagrams is achieved by the Internet Time Stamp Option 600, which is defined within the specification of an IP datagram. Said IP datagrams consist of an IP header 500 as shown in Fig. 5 including the IP options followed by the IP payload. Thereby, options may or may not appear in the IP header 500.
- the Internet Time Stamp Option 600 as depicted in Fig. 6 is used to fill in time stamps.
- the length field 602b contains the length of the whole table, which must be less or equal than 40 Byte.
- the pointer field 602c points to the next unused time stamp 204a/b.
- the oflw field 602d is originally set to zero and is incremented by each host, which wants to fill in a time stamp 204a/b but fails to do so due to an already filled list.
- the flags (flg) field 602e defines whether
- IPv4 Internet Protocol
- All packets that have to be delivered to a mobile terminal 102b are delivered by a so-called “foreign agent", which is situated on the IP network 106a visited by the mobile terminal 102b.
- the "foreign agent” is a software entity which is used in Mobile IP and must be available on a node 104 in the visited network 106a.
- This node 104 is passed by all packets 202a-e directed to the mobile terminal 102b.
- said node 104 must be well suited for the proposed mechanism.
- IPv6 Internet Protocol
- fragmentation only takes place at the sender 102a; there is no transparent fragmentation on the path. In this case, it is sufficient to disallow fragmentation of traffic to mobile nodes 102b in general.
- IP Time Stamp Option 600 causes the packet to exceed the MTU and thus fragmentation becomes necessary, this is done at the aforementioned router.
- the IP Time Stamp Option 600 is only present in the first fragment, as specified in the IP specification.
- Another fragmentation problem can arise if the overall size of the IP datagram exceeds the MTU. In this case, the solution in IPv4 is doing defragmentation in the router that is passed by the traffic.
- an IP datagram is decapsulated by the network layer and handed over to the upper layers.
- the IP header which includes the IP time stamp 204a/b, is not handed over to the upper layers.
- One approach to solve this problem is to modify the operating system's kernel in such a way that the network layer passes IP time stamps 204a/b together with the payload to the socket interface, e.g. by adding a modified socket function call.
- the main difference between the invention and the state of the art is to add additional time stamps 204a+b (TS1 and TS2) at the source 102a and at the base station 104, respectively, and to use these at the sink 102b for a congestion detection 206 of the route through the fixed network 106a between the source 102a and the base station 104.
- the additional new aspect is to take the RTP time stamp information 204b (TS2) for a congestion detection 206 into account.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
- The underlying invention generally relates to the field of mobile computing and/or communication in a heterogeneous network environment with distributed multimedia applications and technologies for high-speed data transfer. More specifically, the invention is directed to the field of Quality-of-Service (QoS) management for adaptive real-time (RT) services running on mobile terminals that support different access technologies for dynamic wire-bound and wireless networks based f.e. on the Transmission Control Protocol (TCP), the Internet Protocol (IP), the Real-Time Transport Protocol (RTP), and/or the User Datagram Protocol (UDP), respectively. In particular, it includes research and development issues which pertain to a method for congestion detection and network management in dynamic communication scenarios targeting to support distributed multimedia applications and services to dynamically adapt to a varying resource availability.
- QoS management is a critical issue for the future multiple-serviced Internet. Thereby, an important aspect is how to effectively control network congestions. Presently, new mechanisms beyond end-to-end control are explored to support the evolution of network services. In this connection, the combination of node-to-node control and network-state-dependent packet scheduling is a promising approach.
- To date, end-to-end congestion detection and control has been the dominant approach for congestion management in Wide Area Networks (WANs). It views the network as a "black box", and the end systems of said network determine the state of congestion by probing packet loss. For this reason, this approach mainly depends on the host mechanism and puts all complexity on network side, which is appropriate for pure best-effort data that have little or no sensitivity to delay or loss of individual packets.
- The increasing popularity of the Internet and the projected growth of multimedia applications has created a number of urgent challenges for network designers and engineers. One of these challenges is congestion management, which includes congestion detection, control and avoidance mechanisms in connectionless and packet-switched dynamic WANs with high-speed access such as the Internet. In view of its best-effort nature, the Internet does not offer any QoS guarantees or support to multimedia applications such as Internet telephony and video conferencing. Consequently, the performance of all these applications may seriously be impaired by network congestion.
- In general, network congestion in wire-bound WANs is affected by the following factors:
- the amount of network traffic generated by the users of said network,
- the underlying network architecture in terms of its links, their connectivity, and the characteristics of each link,
- the operating parameters of sources, routers and destinations within said network (e.g. number and size of the available buffers, the available processing power, specific system design parameters, etc.),
- flow control mechanisms used in the transport layers of the involved media sources and their respective destinations,
- congestion avoidance and congestion recovery schemes in routers and media sources,
- packet admission mechanisms in the network and link layers of media sources and destinations, and
- packet discarding and packet loss mechanisms in routers and destinations.
- If one or more network components have to discard packets due to lack of buffer space, a media source in the network can not reserve bandwidth across the network to its destination. Therefore, it is unable to determine what data rate can be sustained between it and the destination.
- In case a media source transmits data at a rate which is too high to be sustained between it and the destination, one or more routers will begin to queue the packets in their buffers. If the queuing continues, the buffers will become full and packets from the source will be discarded, which causes data loss. If the source attempts to guarantee transmission reliability, retransmission of data and increased transmission time between the source and the destination is the result.
- As the load (the rate of transmitted data) through the network increases, the throughput (the rate of data reaching the destination) increases linearly. However, when the load reaches the network's capacity, the buffers in the routers begin to fill. This increases the response time (the time for said data to traverse the network between the source and the destination) and lowers the throughput. Once the buffers of said routers begin to overflow, packet loss occurs. Increases in load beyond this point increase the probability of packet loss. Under extreme load, response time approaches infinity and the throughput approaches zero; this is the point of congestion collapse due to the extreme drop in throughput.
- In general, a large buffer space does not help to solve the problem of network congestion; this only postpones the inevitable packet loss when network load is larger than network capacity. Slow links by themselves do not cause congestion, but the mismatch of network link speeds helps cause congestion. Similarly, slow processors do not cause congestion. For example, the introduction of a high-speed processor in an existing network may actually increase the mismatch of processing speeds and the chances of congestion. In fact, congestion occurs even if all links and processors work with the same speed.
- When a congestion control scheme is applied, it should be able to meet the following requirements:
- The congestion control scheme should have a low overhead.
- Moreover, it should be "fair". In this connection, defining "fairness" is not trivial, and there is no definition which is commonly accepted.
- Besides, said congestion control scheme should be responsive to available network capacity and user demands.
- Furthermore, the congestion control scheme must be able to work in the reduced environment of congestion, which may additionally be impaired by effects like transmission errors, out-of-sequence packets, and lost packets.
- Finally, said congestion control scheme must be "socially optimal", which means that it must allow the total network performance to be maximized.
- Designing a congestion control scheme that meets all of these requirements is not a trivial issue.
- In high-speed networks offering connections with large delay-bandwidth products, gateways are often designed with large maximum queues to accommodate transient congestion. For the Internet, the TCP detects congestions only after a packet has been dropped at the gateway. However, it would clearly be undesirable to have large queues (possibly on the order of a delay-bandwidth product) that were full most of the time; this would significantly increase the average delay in the network. Therefore, in high-speed networks it is increasingly important to have mechanisms that are able to simultaneously keep throughput high and average queue sizes low.
- In absence of an explicit feedback from the gateway, there are a number of mechanisms that have been proposed for transport-layer protocols to maintain high throughput and low delay in the network. Some of said mechanisms are designed to work with current gateways, while other mechanisms are coupled with gateway scheduling algorithms that require per-connection state in the gateway. Furthermore, transport-layer protocols could infer congestion from the estimated bottleneck service time, from changes in throughput, from changes in end-to-end delay, as well as from packet drops or other methods. Nevertheless, the view of an individual connection is limited by the time scales of the connection, the traffic pattern of the connection, the lack of knowledge of the number of congested gateways, the possibilities of routing changes, as well as by other difficulties in distinguishing propagation delay from persistent queuing delay.
- The most effective congestion detection can be performed in the gateway itself. The gateway can reliably distinguish between propagation delay and persistent queuing delay, and it has a unified view of the queuing behavior over time. In addition, a gateway is shared by many active connections with a wide range of round-trip times, tolerances of delay, throughput requirements, etc.; decisions about the duration and magnitude of transient congestion to be allowed at the gateway are best made by the gateway itself. The method of monitoring the average queue size at the gateway and of notifying connections of incipient congestion is based on the assumption that it is useful to have queues at the gateway where traffic from a number of connections is multiplexed together by means of a First-In-First-Out (FIFO) scheduling. FIFO scheduling is not only useful for sharing delay among connections, reducing delay for a particular connection during its periods of burstiness, but it also scales well and is easy to implement efficiently.
- If an IP stream traverses wire-bound and wireless networks, congestion detection and control of said IP stream is always difficult because presently available congestion detection mechanisms are based on measurements of packet loss detected by time-outs. Unfortunately, this is not feasible for wireless networks, because some of them (e.g. the General Packet Radio Service, GPRS) involve high packet loss and varying latencies without being actually congested.
- According to the state of the art, a plurality of methods and technologies concerning the detection of network congestions in heterogeneous networks is currently available, which are closely related to the topic of the underlying invention. In order to understand the context of the invention, it is necessary to briefly explain the main features involved with said technologies.
- A large part of emerging multimedia applications offering continuous media streams (e.g. audio and video) that are currently used in the Internet are based on UDP as a transport protocol. However, UDP offers no QoS control mechanisms and can therefore not guarantee any level of QoS. For this reason, said multimedia applications do not respond to notifications of congestion from the underlying network. Hence, these applications may severely overload the underlying network and starve other applications. Fluctuations of network conditions combined with the inability of TCP and UDP to support QoS control often render multimedia applications useless. In addition, deploying non-congestion-controlled UDP traffic results in extreme unfairness towards competing TCP traffic. Sending best-effort traffic without any consideration of the network congestion state can easily result in packet losses. In response to that, TCP connections, which constitute around 95 % of the Internet traffic today, would reduce their transmission rates. However, without any rate reduction on behalf of the non-congestion-controlled traffic, the TCP connections would starve and receive much less than their fair bandwidth shares. Therefore, UDP sources need to be enhanced with congestion control schemes that do not only aim at reducing loss ratios and improve bandwidth utilization but are also fair towards competing TCP connections ("TCP-friendly").
- Currently, different approaches are being discussed for solving QoS and congestion control problems such as resource reservation, priority mechanisms and application control, i.e. to instruct the applications at the end systems to adapt the bandwidth share they are utilizing to the network congestion state. Reserving enough resources for supporting a certain QoS level in advance guarantees this QoS level and would be the most straightforward approach for handling the problem. However, as it is usually impossible to know the exact characteristics of a media stream in advance, one would tend to over-allocate resources to guarantee the requested QoS level, leading to network underutilization. In addition to the complexity and scalability problems of reservation-based QoS control schemes, these schemes do not easily allow the use of extra bandwidth, e.g. for improved quality during network underload states.
- With priority mechanisms, different data packets or streams are labeled with different priorities and thereby treated differently at the network routers. Such an approach is simpler than the reservation approach as it requires no signaling and less complicated control mechanisms at the routers. However, the exact mechanisms for setting the priority levels, the router mechanisms for controlling these levels, and the actual gain achieved with such an approach are still under discussion.
- An important gateway mechanism for congestion control according to the state of the art is packet scheduling. It can determine the way in which different flows interact with each other, and thus affect the collective traffic behaviors in the router. It allocates three quantities for a flow, bandwidth, promptness, and buffer space. In a multiple service environment, it can guarantee fairness and transmission rate for a particular flow. Owing to the advantages of packet scheduling, it has been implemented in cutting-edge IP routers of many providers. Based on both the theoretical and practical research on packet scheduling, it can be made adaptive to network state. At an,instant it may allocate more bandwidth to a flow to be congested than its share while limiting bandwidth shares of flows not to be congested. In this way, loss of packets can be reduced and network utility and performance can be improved. Because the packet scheduler monitors and controls flows directly, it is able to exploit the packet level utility further. Close coordination among routers and between the router and the host can also enhance congestion control. If downstream links notify upstream packet schedulers of the congestion status, traffic behaviors of flows can be better controlled. The packet scheduler can also do smart marking on packets according to different policies so as to inform the sources to adjust sending rates in a network-dependent fashion. This close coordination between the network and the sources can optimize bandwidth sharing among flows dynamically. Meanwhile, it can limit the amount of traffic entering the network in time efficiently.
- Pricing has a twofold effect on congestion control. To the host, it provides an incentive for users to limit their usage of the network resource and adapt their applications to network congestion. In principle, this,can limit the amount of traffic of a flow entering the network and thus help control congestion. To the network, a price-driven scheduling can lead to a more efficient use of scarce resources (bandwidth). It can be assumed that the willingness of payment reflects certain aspects of the quality requirement of a user for its applications. Users who are willing to pay more should get better service at congestion. The pricing adds a new and important dimension for resource allocation and fairness guarantee.
- The following technologies are closely related to the herewith presented topic of the underlying invention:
- Measurement of inter-arrival times and jitter observation: In the article "Estimating the Available Bandwidth for Real-Time Traffic over Best-Effort Networks" (in: W. Dabbous and C. Diot (editors), "Proceedings of the 5th Workshop on Protocols for High-Speed Networks", Sophia Antipolis, France, 1996, Chapman & Hall, pp. 3-12) by F. Davoli (Univ. of Genoa), O. Khan, and P. Maryni, and "Load Estimation and Control in Best-Effort Network Domains" (Journal of Network and Systems Management, to appear) by P. Maryni and F. Davoli, different methods for a detection of network congestion in best-effort networks based on measurements of inter-arrival times are described.
- Application of TCP-compatible, Additive-Increase and Multiplicative-Decrease (AIMD) congestion control mechanisms: In "Adaptive Playout Mechanisms for Packetized Audio Applications in Wide-Area Networks" (in: Proceedings of the Conference on Computer Communications (IEEE Infocom), pp. 680-688, Toronto, Canada, June 1994) by R. Ramjee, J. Kurose, D. Towsley, and H. Schulzrinne, and "The Loss-Delay Adjustment Algorithm: A TCP-Friendly Adaptation Scheme" (in: Proc. of NOSSDAV, Cambridge, UK, 1998) by D. Sisalem and H. Schulzrinne (Columbia University), traffic rate control schemes are extensively discussed. Thereby, H. Schulzrinne is a prominent author, who is especially concerned with RTP and multimedia streaming.
- Mobile Transmission Control Protocol (MTCP): In the article "Improving End-to-End Performance of TCP over Mobile Internetworks" (in: Proceedings of the IEEE 1994 Workshop on Mobile Computing Systems and Applications, Santa Cruz, California, USA, 1994) by R. Yavatkar (Intel) and N. Bhagawat, the Multicast Transmission Control Protocol (MTCP) - an algorithm providing a scalable TCP-friendly congestion control for reliable multicast - is described, which modifies the acknowledge (ACK) mechanism in the Transmission Control Protocol (TCP) to avoid faulty loss detection due to extreme delays.
- Migratory Transmission Control Protocol (M-TCP) and Migratory Real-Time Protocol (M-RTP): In "Extensions to RTP to Support Mobile Networking" (in: Proceedings of the Third International Symposium on Multi-Dimensional Mobile Communications (MDMC'98), 1998) by K. Brown and S. Singh (Portland State University), M-TCP is described, which achieves a similar object like MTCP but with a different mechanism that keeps the original semantic of ACK packets. M-RTP, which is described in "M-TCP: TCP for Mobile Cellular Networks" (in: ACM Computer Communication Review, Vol. 27(5), 1997) by K. Brown and S. Singh, discusses the semantics of Real-Time Control Protocol (RTCP) reports and stream adaptations appropriate for mobile networks. Thereby, the focus is on the reaction upon bandwidth limitations, not on detecting them.
- Indirect Transmission Control Protocol (I-TCP): In "I-TCP: Indirect TCP for Mobile Hosts" (in: Proceedings of the 15th International Converence on Distributed Computing Systems, pp. 136-1431, Vancouver, Canada, 1995) by A. Bakre and B. R. Badrinath, I-TCP is described, which introduces a flow relay scheme to separate wire-bound and wireless parts in a network path.
- A comparison to related works according to the state of the art can be taken from Table 1.
- A well-known example for congestion detection and avoidance in packet-switched networks according to the state of the art is the Random Early Detection (RED) algorithm, which is performed by means of RED gateways designed to accompany transport layer congestion control protocols such as TCP. Thereby, a RED gateway notifies connections of congestion either by dropping packets that arrive at the RED gateway or by setting a bit in the packet headers. It detects incipient congestion by computing the average queue size q̅. For this purpose, a low-pass filter with an exponential weighted moving average is used. Then, q̅ is compared with two preset thresholds, a minimum threshold q min and a maximum threshold q max. If q̅ is less than q min, no packets are marked; if q̅ is greater than q max, each arriving packet is marked. However, if the average queue size q̅ is between q min and q max, each arriving packet i is marked with a probability P i , which is a function of the average queue size q̅.
- Whereas the RED algorithm mentioned above is designed to keep the average queue size q̅ low while simultaneously allowing occasional bursts of packets in the queue, DECbit gateways set the congestion indication bit in each arriving packet if the average queue size exceeds a preset threshold.
- In the paper "On Estimating End-to-End Network Path Properties", Allman M. et al consider two basic transport estimation problems: determining the setting of the retransmission timer for a reliable protocol, and estimating the bandwidth available to a connection as it begins. They look at both of these problems in the context of TCP, using a large TCP measurement set for trace-driven simulations. For retransmission timer estimation, they evaluate a number of different algorithms, finding that the performance of the estimators is dominated by their minimum values, and to a lesser extent, the timer granularity, while being virtually unaffected by how often round-trip time measurement are made or the settings of the parameters in the exponentially-weighted moving average estimators commonly used.
- Conventional mechanisms according to the state of the art which provided an end to end congestion detection and control do encounter the problem that they have to infer network congestion from indirect evidence such as packet loss and round-trip delay increases. In many cases, these inferences are wrong and packets are lost. Mechanisms which feed congestion information from routers back to traffic sources seem to work more effectively than sheer end-to-end mechanisms. Thus, TCP congestion avoidance mechanisms are no longer sufficient to provide good service under all circumstances. For this reason, additional mechanisms are needed in the routers to complement said end-to-end congestion avoidance mechanisms. For routers, one possible approach is to detect flows that are unresponsive to congestion notifications, and to reduce service levels for these flows when a congestion occurs. In this connection, unresponsive applications are "punished" and forced to comply when a congestion is notified. The challenge is to develop efficient, low-overhead algorithms that detect unresponsive flows. For this object, no perfect solutions have yet been developed.
- Moreover, most end-to-end congestion detection and control mechanisms require a round-trip timer to detect packet loss, which is a problem in itself. Due to the often high variance in round-trip time, the timer is usually set too low or too high, thereby causing unneeded packet retransmission or poor throughput, respectively. Its inaccuracy leads to incorrect end-to-end judgements of current levels of congestion based on packet loss. Besides, a round-trip timer is computationally expensive to implement.
- The ultimate object of any congestion detection and control scheme is to reduce network load to a sustainable value. Simplistic schemes such as Source Quench only inform a data source of the existence of congestion within the network; no other information can be deduced. Protocols such as DECbit are an improvement of Source Quench in terms of their detection of congestion and the return of this information to the sources. However, again, only the existence of congestion is returned to the sources. Schemes like RED, while admirable in attempting to address the problems of end-to-end congestion control, can only indicate congestion by dropping packets, which should not be discarded unless absolutely necessary.
- In general, congestion control schemes in which network components such as routers are involved are supposed to be more effective than pure end-to-end congestion control schemes. As most network congestion occurs in routers, they are in an ideal position to monitor network load and congestion and to use this information in a congestion detection and control scheme. Thereby, network-based congestion detection and control schemes are able to feedback congestion data to the transmitting media sources, thus directly altering their behavior. Alternatively, network-based schemes can change the packet processing within routers. This can help alleviate congestion, and may also indirectly affect the behavior of media sources.
- In Fig. 1, the
network scenario 100 is depicted to which the proposed solution according to the underlying invention applies. Thereby, a fixed node A (themedia source 102a) is situated somewhere in a fixednetwork 106a (e.g. in the Internet); the mobile node B (the data sink 102b) is attached to said fixednetwork 106a over a wireless mobile network 106b (e.g. via GPRS). In this scenario, an IP packet which is sent from thesource 102a to the sink 102b is conveyed by a number of fixed network links and routers, until it reaches the router between the fixednetwork 106a and the wireless network 106b - thebase station 104. From there, it is conveyed to the mobile node B via a wireless link. - In the following, the focus shall be on UDP traffic, especially on multimedia streams using RTP on the basis of UDP.
- The
scenario 100 described above is a typical scenario for mobile multimedia applications such as Video-on-Demand (VoD). Thereby, the client located on peer B is accessing multimedia data which are available at peer A. In such a scenario, multimedia streams are traversing the fixednetwork 106a and the mobile network 106b from peer A to peer B. Therefore, peer A is called thesource 102a and peer B the sink 102b of such a multimedia stream. - The problem to be solved in this context is to detect network congestion in the described
scenario 100.Congestion detection 206 is needed for a lot of issues, in particular - for a detection of the available bandwidth or bottleneck bandwidth for algorithms that try to measure link characteristics such as the available bandwidth or the bottleneck bandwidth of a link, and
- for a network adaptation on application level, by which applications are enabled to transform their data depending on the current conditions of the
underlying networks 106a+b (especially real-time video applications that reduce their frame rates when a congestion occurs). - It is always difficult to detect the congestions of an IP stream if the stream traverses wire-bound
networks 106a and wireless networks 106b. This is the case since presently available congestion detection mechanisms according to the state of the art are based on measurements of packet loss or delay variation, and wireless networks solutions (e.g. GPRS) introduce high packet loss and varying latencies without being actually congested. Therefore, the employed mechanisms can not distinguish if the measured values are due to network congestion or due to the characteristics of the applied wireless network 106b. For this reason, conventional congestion detection mechanisms do not work well in the describedscenario 100. - By contrast, the proposed solution according to the underlying invention is based on a
congestion detection 206 by observing packet delays. The basic issue here is to analyze whether there is a "sudden increase" in the sequence of observed packet delays from thesource 102a to the sink 102b. This approach is quite similar to the observation of packet inter-arrival times, which has been discussed in "Estimating the Available Bandwidth for Real-Time Traffic over Best-Effort Networks" (in: W. Dabbous and C. Diot (editors), "Proceedings of the 5th Workshop on Protocols for High-Speed Networks", Sophia Antipolis, France, 1996, Chapman & Hall, pp. 3-12) by F. Davoli, O. Khan, and P. Maryni. The problem with the inter-arrival times is that the packet sequence in mobile networks and internetworks can be severely distorted. The herein proposed solution is partly solving this issue as it allows performing acongestion detection 206 separately on thefixed part 106a and the wireless part 106b of the route. - In view of the above explanations, it is the object of the invention to propose a method for congestion detection and network management in heterogeneous communication networks supporting Distributed Multimedia Systems (DMSs), applications and technologies with high-speed access to dynamically adapt to varying resource availability.
- This object is achieved by means of the features of the independent claims. Advantageous features are defined in the dependent claims. Further objects and advantages of the invention are apparent in the following detailed description.
- The proposed solution according to the underlying invention is basically dedicated to a method for detecting network congestions in fixed networks based on the Internet Protocol (IP), especially for multimedia streams of applications using RTP packets carried by UDP packets, targeting to support distributed multimedia applications to dynamically adapt to varying resource availability. This method is based on adding time stamps to the IP packets and performing the congestion detection based on the observation of packet delays.
- The
independent claim 1 and thedependent claims 2 to 9 are directed to methods used for the detection, analysis and/or adaptive control of network congestions along the communication path used for continuous media streams transmitted between two peers in a (heterogeneous) network environment with distributed adaptive multimedia applications and services being able to dynamically adapt to varying resource availability by evaluating time differences of two or more time stamps added to each data packet of said media streams. - Thereby, said network environment comprises at least one base station serving as a router for the communication link between said peers, at least one connectionless and packet-switched wire-bound datagram network for the transmission of said data packets between the first peer, which serves as a media source, and said base station, and at least one wireless network for the transmission of said data packets between said base station and the second peer, which serves as a media sink. In this connection, said time stamps are added to said data packets by the first peer and/or the base station and evaluated by the second peer in order to observe the packet delay said data packets encounter on the path through the wire-bound datagram network between the first peer and the base station for getting a qualitative status information of said wire-bound datagram network.
- The independent claim 10 pertains to a mobile terminal configured for performing a method according to
claim 1 to 4. - Moreover, the independent claims 12 and claim 11 refer to a base station and a scheduler framework implemented in said base station which serves as an active node for enabling an adaptive allocation of bandwidth and/or an adaptive scheduling of data packets to be transmitted through said wire-bound datagram network depending on the current congestion state of said network by applying a method according to anyone of the
claims 1 to 9. - Finally, the independent claims 13 and 14 pertain to a software program and an extension of a communication protocol providing a guaranteed end-to-end quality for a telecommunication session between two peers that realize a method according to anyone of the
claims 1 to 9 when executed by the central processing unit of the second peer. - Further advantages and possible applications of the underlying invention result from the subordinate claims as well as from the following description of the preferred embodiment of the invention which is depicted in the following drawings. Herein,
- Fig. 1
- outlines a network scenario consisting of a first node A (the media source), which is situated somewhere in a fixed network (e.g. in the Internet), and a second node B (the data sink), which is attached to said fixed network over a wireless mobile network (e.g. via GPRS),
- Fig. 2
- presents an example scenario showing the transmission of a continuous media stream to be transmitted from peer A to peer B by means of UDP packets,
- Fig. 3
- presents an example scenario showing the transmission of a continuous media stream to be transmitted from peer A to peer B by means of RTP packets,
- Fig. 4
- depicts the structure of the employed RTP header,
- Fig. 5
- depicts the structure of the employed IP header, and
- Fig. 6
- illustrates the structure of the Internet time stamp option field.
- In the following, the preferred embodiment of the underlying invention as depicted in Figs. 2 to 6 shall be explained in detail. The meaning of the symbols designated with reference signs in Figs. 1 to 6 can be taken from Table 4.
- For simplicity, the following assumptions shall be made in the next sections:
- 1. For the moment, only unicast services are considered. In multicast services and point-to-multipoint services, rate control must be treated differently than in unicast services because every change on a
sender 102a always affects a whole group of clients 102b. - 2.If DiffServ or similar techniques are applied, all
packets 202a-e and/or 302a-e in one flow are assumed to be in the same traffic class. This assumption is necessary for any kind ofcongestion detection 206 based on transport delays. Otherwise, routers would differently treat packets belonging to different classes - i.e. by different router queues -, and the transport delays would be not comparable. - 3. For the same reason, the
packets 202a-e and/or 302a-e should be smaller than the Path Maximum Transmission Unit (PMTU) to avoid transparent fragmentation, which would lead to fragmentation times and to different packet sizes. - 4.Any bit errors in UDP datagrams 202a-e shall be ignored: Thereby, UDP datagrams 202a-e must not be discarded, no matter whether the Service Data Unit (SDU) is corrupt or not. Any error handling is strongly due to the application. Moreover, there is no automatic retransmission at all.
- 5. It shall be assumed that the route from the fixed
node 102a to the mobile node 102b and vice versa will not change for a reasonable amount of time. - In the context of the underlying invention, the network architecture of the wire-bound
network 106a features the following characteristics: - The
network 106a is a wide-area network with nodes in the network passing data to other nodes along links. The nodes are arbitrarily connected; thenetwork 106a does not have a particular topology (e.g. spanning tree, hypercube, etc.). - The
network 106a is connectionless. There is no reservation of network bandwidth or resources between a source of data transmission and its intended destination. End-to-end "connections" may be set up by the Transport Layers in the source and destination, but the other nodes within thenetwork 106a are oblivious to these Transport Layer operations. - The
network 106a is packet-switched.Packets 202a-e and/or 302a-e are individually routed from thesource 102a to the destination 102b. They may take different routes, and may arrive at the destination 102b out-of-order. - Variable-
sized packets 202a-e and/or 302a-e are routed from one link to the next via nodes, often known as packet switches, gateways, or more commonly, routers. Routers usually bufferincoming packets 202a-e and/or 302a-e before they are transmitted on an outgoing link as described below. - The
network 106a uses semi-static routing. Routes can change slowly over time, but most routes are static. - The
network 106a sets no bandwidth constraints ondata sources 102a. Asource host 102a may attempt to transmit data at a rate which will exceed the bandwidth or resources on the links andnodes 104 between it and the destination host 102b. - Links are assumed to have fixed bandwidths with no service guarantees. There is no expectation of error or flow control on any link.
- The
network 106a makes no transmission guarantees. The links on thenetwork 106a have finite bandwidth, and thenodes 104 have finite buffer space forpackets 202a-e and/or 302a-e waiting to be routed. If, for any reason,network components 104 are unable to pass data on to the destination 102b, the data may be discarded. This type of network is also known as a best-effort network. - The
network 106a is an internetwork, in whichnodes 102a+b and 104 are connected by links that greatly vary in type. For example, there may be large variations in the physical characteristics of the links, the Medium Access Control (MAC) mechanism of the links, the bit rate on the links, the bit error rate on the links, and the maximum packet size on the links. - The bandwidth on each link is generally static. It usually changes only when upgrades to the network infrastructure are performed.
- As depicted in Fig. 2, the main idea for the
congestion detection 206shown'in scenario 200 comprises the following steps: - 1. When an
IP datagram 202a-e leaves node A, thesource 102a adds afirst time stamp 204a (TS1) to saidIP datagram 202a-e. For example, this time stamping can be done by anIP option field 600. - 2.When an
IP datagram 202a-e enters the router at the mobile network'sbase station 104, the router adds atime stamp 204b (TS2) to theIP datagram 202a-e. For example, this can be done by anIP option field 600. - 3. The congestion in the "fixed-network part" 106a of the path from the
source 102a to the sink 102b is then detected by the analysis of transport delays based on the difference between thetime stamp 204a (TS1) at thesource 102a and thetime stamp 204b (TS2) added at thebase station 104. Thecongestion detection 206 is done at the sink 102b. - In the following, the IP, UDP and RTP data flow throughout the
networks 106a+b and the exact mechanism howtime stamps 204a+b are added shall be described. Moreover, the detailed packet structure of IP, UDP and RTP shall be described. - In Figs. 2 and 3, the term "UDP" always refers to UDP datagrams 202a-e that are encapsulated into an IP datagram. For simplicity, since UDP datagrams 202a-e are always encapsulated into IP datagrams, the IP datagrams are left out.
- In the special case of multimedia streams using
RTP packets 302a-e carried byUDP packets 202a-e as depicted in Fig. 3, the first step can be omitted sinceRTP packets 302a-e are already marked with atime stamp 204a (TS1) by thesender 102a. Therefore, if this mechanism is only applied forRTP streams 302a-e, there is no need to make any changes to thesource 102a. - The same applies to any other protocols that add
time stamps 204a (TS1) at thesource 102a. RTP is mentioned here because it is a proposed Internet standard and widely used in the Internet as described in "RTP: A Transport Protocol for Real-Time Applications" (IETF Request for Comments (RFC) 1889 (proposed standard), Internet Engineering Task Force, Jan. 1996) by H. Schulzrinne, S. Casner, R. Frederick, and V. Jacobson. - With these
time stamps 204a (TS1), it is then possible to observe the delay a packet encounters on the path through the fixednetwork 106a from thesource 102a to thebase station 104. The observation of the packet delay in this "fixed-network part" 106a of the path from thesource 102a to the sink 102b can be used for a qualitative network status information of thepath 106a from thesource 102a tobase station 104, e.g. for an estimation whether the fixednetwork 106a is currently congested or not. - Such a
congestion detection 206 is performed by using the same algorithms as used by the inter-arrival time approaches, however, it is now based on the measured packet delays on the fixednetwork 106a, and the wireless network 106b can be measured separately. Therefore, thecongestion detection 206 can work on the "fixed-network part" 106a without taking the (problematic) "wireless-network part" 106b into account. The network status and the available bandwidth on the other part of the path from thebase station 104 to the sink 102b is often determined by negotiation between the sink 102b and the network operator. -
Time stamps 204a+b are only added to IP packets. There is no need to add any time stamps inRTP packets 302a-e, because RTP datagrams 302a-e contain atime stamp 204a by definition. Said RTP datagrams consist of aheader 400 followed by the RTP payload. The structure of theRTP header 400 can be taken from Fig. 4. - Each sender of an
RTP datagram 302a-e is obliged to fill in the time-stamp 204a into therespective RTP packet 302a-e as prescribed by the specification of RTP. - Adding
time stamps 204a+b to IP datagrams is achieved by the InternetTime Stamp Option 600, which is defined within the specification of an IP datagram. Said IP datagrams consist of anIP header 500 as shown in Fig. 5 including the IP options followed by the IP payload. Thereby, options may or may not appear in theIP header 500. In the method presented in the scope of the underlying invention, the InternetTime Stamp Option 600 as depicted in Fig. 6 is used to fill in time stamps. - The first eight bit, given by the
field 602a, identify theoption 600. The length field 602b contains the length of the whole table, which must be less or equal than 40 Byte. Thepointer field 602c points to the nextunused time stamp 204a/b. Theoflw field 602d is originally set to zero and is incremented by each host, which wants to fill in atime stamp 204a/b but fails to do so due to an already filled list. The flags (flg)field 602e defines whether -
time stamps 204a/b are added by any node said data packet's 202a-e have passed (flg = 0), -
time stamps 204a/b and IP addresses of passed nodes are filled in (flg = 1), or -
time stamps 204a/b may only be filled in by "hosts of interest", i.e. hosts whose IP addresses are already filled into the list (flg = 3). - For the purpose of the underlying invention, usually flg = 1 will be sufficient to get the router of the
base station 104 fill in itstime stamp 204b as mentioned above. If the path from thesource 102a to the sink 102b is too long, said router must be defined as "host of interest", i.e. theflg field 602e is set to "3" and the IP address of said router is filled into theaforementioned option 600. - Most of the Internet traffic does not have the IP
Time Stamp Option 600 set. For the purpose of the herewith presented invention, two cases have to be distinguished: - IP datagrams have the IP
Time Stamp Option 600 set by thesource 102a. In this case, it must be ensured that there is room for the router of thebase station 104 to insert itstime stamp 204b into theoption 600. For this reason, the IPTime Stamp Option 600 can be set to its initial state. - IP datagrams have not set the IP
Time Stamp Option 600 by thesource 102a. In this case, the IPtime stamp option 600 must be inserted. - Both operations have to be executed by the router of the
base station 104 which is passed by the traffic discussed above. In particular, since sent IP datagrams are modified by the router, it is crucial that whole IP datagrams are accessible on this router, even if they have been split up into fragments on their way from thesource 102a to the sink 102b. In other words: The router which modifies an IP datagram must defragment the whole packet. Therefore, it must be passed by all fragments belonging to the IP datagram to be modified. In the fourth version of the Internet Protocol (IPv4), the existence of an appropriate router for this task is guaranteed due to the use of mobile IP. All packets that have to be delivered to a mobile terminal 102b are delivered by a so-called "foreign agent", which is situated on theIP network 106a visited by the mobile terminal 102b. Thereby, the "foreign agent" is a software entity which is used in Mobile IP and must be available on anode 104 in the visitednetwork 106a. Thisnode 104 is passed by allpackets 202a-e directed to the mobile terminal 102b. Hence, saidnode 104 must be well suited for the proposed mechanism. In the sixth version of the Internet Protocol (IPv6), fragmentation only takes place at thesender 102a; there is no transparent fragmentation on the path. In this case, it is sufficient to disallow fragmentation of traffic to mobile nodes 102b in general. This is possible, since inIP version 6 thesender 102a knows about the Maximum Transmission Unit (MTU) available on the path. Consequently, fragmentation can be avoided by passing appropriate maximum packet sizes or maximum segment sizes to the upper layers. In fact, this approach is considered preferable to fragmentation because it causes less overhead than fragmentation and defragmentation. Today, the general tendency in the Internet community is to totally avoid fragmentation of IP datagrams. - Nevertheless, if the insertion of the IP Time Stamp Option, 600 causes the packet to exceed the MTU and thus fragmentation becomes necessary, this is done at the aforementioned router. In this case, the IP
Time Stamp Option 600 is only present in the first fragment, as specified in the IP specification. Hence, it is guaranteed that there is only one unique IP TimeStamp Option field 600 present in the IP packet arriving at the mobile terminal 102b. Another fragmentation problem can arise if the overall size of the IP datagram exceeds the MTU. In this case, the solution in IPv4 is doing defragmentation in the router that is passed by the traffic. - In the mobile terminal 102b, an IP datagram is decapsulated by the network layer and handed over to the upper layers. Normally, the IP header, which includes the
IP time stamp 204a/b, is not handed over to the upper layers. One approach to solve this problem is to modify the operating system's kernel in such a way that the network layer passesIP time stamps 204a/b together with the payload to the socket interface, e.g. by adding a modified socket function call. - The main difference between the invention and the state of the art is to add
additional time stamps 204a+b (TS1 and TS2) at thesource 102a and at thebase station 104, respectively, and to use these at the sink 102b for acongestion detection 206 of the route through the fixednetwork 106a between thesource 102a and thebase station 104. The additional new aspect is to take the RTPtime stamp information 204b (TS2) for acongestion detection 206 into account. - The described approach is more robust than the existing ones due to the
additional time stamp 204a (TS1) at thesource 102a. Other approaches only measure the difference in the inter-arrival times of thepackets 202a-e at the sink 102b. They assume that thepackets 202a-e were sent equally distributed over time. The described approach does not need such assumptions as the real time the packets need for the transmission can be measured by using thetime stamps 204a+b (TS1 and TS2). - The described approach can take specific RTP (time stamp) characteristics into account.
- The presented approach performs a
congestion detection 206 at the sink 102b. In general, saidcongestion detection 206 is done at thesource 102a. Performing saidcongestion detection 206 at the sink 102b has the following advantages:- Only the simplex flow from A to B is considered. The
congestion detection 206 is independent from the properties of the flow from B to A. This avoids problems which are encountered in classical congestion control schemes when they are used in networks with asymmetrical bandwidth, e.g. in networks applying the Universal Mobile Telecommunications System (UMTS). - Making flow adaptation decisions at the sink 102b means that they are made on the client. As only the mobile client holds the information, which flows are active, whether all flows are to be treated equally or whether there are priorities, only the client is allowed to make adaptation decisions that match the requirements defined by the QoS management.
- Although flow interdependencies, e.g. shared links on a path, are generally not known to the client, some interdependencies can be derived from
congestion observations 206. For example, if the increase of a flow rate results in a congestion only on this flow, it is a valid conclusion that no other active flow on the client shares the bottleneck link with the congested flow, because congestion always affects all flows on a link and not only one.
- Only the simplex flow from A to B is considered. The
- The approach of introducing
time stamps 204b (TS2) at the router of thebase station 104 is completely protocol-independent and does not require any kind of flow state information on the router, which is the case in some split connection approaches. - Considering transport times is sometimes critical owing to the unknown resolutions of clocks that are applied to routers. The intended approach uses the
RTP time stamp 204a (TS1) on theRTP source 102a. The resolution of the RTP synchronization source is defined by the application and can thus be considered to be sufficient. Hence, only the clock at the router of thebase station 104 is required to have a sufficient resolution to detect changes in transport delays. In addition, because only the slope of the delays and no absolute values are considered, there is no necessity for any clock synchronization. - A difference between the presented approach and other approaches is that usually the round-trip time or the jitter between different RTCP receiver reports is taken into account. All these approaches consider end-to-end transport times, in case of RTP even twice. As a consequence, all these approaches suffer from unpredictable latencies on the wireless link. As only the "fixed-network part" 106a is taken into account for a
congestion detection 206, whereas the part of the wireless link 106b is managed by management information provided by the applied wireless link technology, this approach is robust against any unpredictable characteristics and behaviour of wireless networks 106b.
Technologies | Comment |
Inter-Arrival Times, Jitter, Observation | The hereby presented technique is needed to observe delays. In general, inter-arrival times are sensitive to packet order distortion and to packet loss as well since inter-arrival times are measured between subsequent packets. |
AIMD Stream Adaptation | The related work focuses on rate control schemes. Congestion control schemes are taken for granted. |
MTCP | MTCP focuses on the loss detection in TCP, which is based on time-out observation. It interferes with the acknowledge (ACK) mechanism of the Transmission Control Protocol (TCP) to alleviate faulty loss observation as a result of undue high latencies, which are often encountered in wireless networks. The approach will only work with TCP. |
M-TCP, M-RTP | M-TCP is similar to MTCP, although the ACK manipulation is done with a different mechanism. Nevertheless, the mechanism is still restricted to TCP. M-RTP is focused on the evaluation of congestion and appropriate RTCP semantics. Nevertheless, M-RTP does not deal with congestion detection. |
I-TCP | I-TCP is a circuit relay approach that is designed for TCP to alleviate problems due to the end-to-end mechanisms in TCP in conjunction with wireless networks. |
Term | Definition |
Connection | Semi-permanent relationship between two nodes in a network; within the context of said relationship, data can be exchanged in an exclusive and controlled manner. |
Source | A place from which data is taken. |
Sink | A place where data is moved to from a source. |
Service Data Unit | In layered systems, a set of data that is sent by a user of the services of a given layer, and is transmitted to a peer service user without being changed semantically. |
MTU | Short for Maximum Transmission Unit, the largest physical packet size, measured in bytes, that a network can transmit. Any messages larger than the MTU are divided into smaller packets before being sent. |
Abbr. | Explanation |
GPRS | General Packet Switched Radio |
IETF | Internet Engineering Task Force |
IP | Internet Protocol |
MTU | Maximum Transmission Unit |
RTP | Real-Time Transport Protocol |
SDU | Service Data Unit |
UDP | User Datagram Protocol |
UMTS | Universal Mobile Telecommunication System |
Claims (14)
- A method for the detection (206), analysis and/or adaptive control of network congestions along the communication path used for media streams transmitted between a first peer (102a) serving as a media source and a second peer (102b) serving as a media sink, said network (106a-b) comprising at least one base station (104) serving as a router for the communication link between the peers (102a-b),
wherein the second peer (102b) evaluates time differences of at least two time stamps (204a-b) added to each data packet (202a-e) of said media streams, characterized by following steps:- a first time stamp (204a) is,added to the data packets (202a-e) at the first peer (102a),- the data packets (202a-e) are transmitted between the first peer (102a) and the base station (104) through at least one connectionless and packet-switched wire-bound datagram, network (106a),- the base station (104) adds a second time stamp (204b) to the data packets (202a-e),- the data packets (202a-e) are transmitted between the base station (104) and the second peer (102b) through at least one wireless network (106b), and- the second peer (102b) evaluates said time stamps (204a-b) in order to observe the packet delay said data packets (202a-e) encounter on the path through the datagram network (106a) between the first peer (102a) and the base station (104). - A method according to claim 1,
characterized in that
the first peer (102a) adds the first time stamp (204a) to the data packets (202a-e). - A method according to claim 1 or 2,
characterized in that
the protocol used by the media streams adds the first time stamp (204a) to the data packets (202a-e). - A method according to anyone of the claims 1 to 3,
characterized in that
the second peer (102b) performs a node-to-node congestion detection (206), analysis and/or adaptive control for the communication path between the first peer (102a) and the base station (104) through the connectionless and packet-switched wire-bound datagram network (106a) by calculating said time differences and/or performing an adaptive packet scheduling based on the status information of said network. - A method according to anyone of the claims 1 to 4,
characterized by
supporting different access technologies in dynamic wire-bound and/or wireless networks based on congestion control mechanisms according to the Transmission Control Protocol, TCP, and/or the Internet Protocol, IP, thereby relying on the end-to-end Real-Time Transport Protocol, RTP, and/or the User Datagram Protocol, UDP, for feedback information on the current network status with regard to the respective communication path. - A method according to anyone of the claims 1 to 5,
characterized in that
said congestion detection (206), analysis and/or adaptive control mechanisms are applied to multicast traffic. - A method according to anyone of the claims 5 and 6,
characterized in that
in case IP datagrams are transmitted, the Internet Time Stamp Option (600) fields of the IP headers (500) are used to fill in said time stamps (204a-b). - A method according to anyone of the claims 5 and 6,
characterized in that
in case RTP datagrams (302a-e) are transmitted via UDP, the time stamp fields (404) of the RTP headers (400), which have to be filled out by the first peer (102a) according to the specification of RTP, are taken into account for the congestion detection (206) on the path through the wire-bound datagram network (106a) between the first peer (102a) and the base station (104) by the second peer (102b). - A method according to anyone of the claims 1 to 8,
characterized in that
the network status and the available bandwidth on the other part of the path through the mobile network (106b) between the base station (104) and the second peer (102b) is determined by negotiation between the second peer (102b) and the network operator. - A mobile terminal configured for performing a method according to claims 1 to 4.
- A scheduler framework of a base station (104) serving as an active node for enabling an adaptive allocation of bandwidth arid/or an adaptive scheduling of data packets (202a-e) to be transmitted through at least one connectionless and packet-switched wire-bound network (106a) depending on the current congestion state of said network (106) by applying a method according to anyone of the claims 1 to 9.
- A base station configured for implementing a method according to anyone of the claims 1 to 9.
- A software program implementing a method according to anyone of the claims 1 to 9 when executed by a processing unit (102b).
- An extension of a communication protocol providing a guaranteed end-to-end quality for a telecommunication session between two peers (102a-b) by performing a method according to anyone of the claims 1 to 9.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02003558A EP1341350B1 (en) | 2002-02-15 | 2002-02-15 | A method for congestion detection for IP flows over a wireless network |
DE60210918T DE60210918T2 (en) | 2002-02-15 | 2002-02-15 | Method for overload detection of IP flows over a wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02003558A EP1341350B1 (en) | 2002-02-15 | 2002-02-15 | A method for congestion detection for IP flows over a wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1341350A1 EP1341350A1 (en) | 2003-09-03 |
EP1341350B1 true EP1341350B1 (en) | 2006-04-26 |
Family
ID=27675627
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02003558A Expired - Lifetime EP1341350B1 (en) | 2002-02-15 | 2002-02-15 | A method for congestion detection for IP flows over a wireless network |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP1341350B1 (en) |
DE (1) | DE60210918T2 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4736549B2 (en) | 2005-06-10 | 2011-07-27 | 日本電気株式会社 | BAND CONTROL DEVICE, BAND CONTROL METHOD, BAND CONTROL PROGRAM, AND BAND CONTROL SYSTEM |
JP4770279B2 (en) * | 2005-06-10 | 2011-09-14 | 日本電気株式会社 | BAND CONTROL DEVICE, BAND CONTROL METHOD, BAND CONTROL PROGRAM, AND BAND CONTROL SYSTEM |
US7797722B2 (en) | 2006-05-26 | 2010-09-14 | Sony Corporation | System and method for content delivery |
US20100329161A1 (en) * | 2007-10-02 | 2010-12-30 | Nokia Corporation | IP MTU Control Based on Multiradio Schedule |
CN101848130A (en) * | 2009-03-27 | 2010-09-29 | 北京大学深圳研究生院 | Method based on response drive for controlling UDP congestion of P2P streaming media |
CN101834759A (en) * | 2010-04-21 | 2010-09-15 | 中兴通讯股份有限公司 | Detection method of binding link and distributed equipment |
US9215184B2 (en) | 2011-10-17 | 2015-12-15 | Hewlett-Packard Development Company, L.P. | Methods of and apparatus for managing non-congestion-controlled message traffic in a datacenter |
US10560383B2 (en) * | 2016-11-10 | 2020-02-11 | Futurewei Technologies, Inc. | Network latency scheduling |
CN111615148B (en) * | 2020-05-18 | 2023-09-26 | 京信网络系统股份有限公司 | Base station TCP data transmission processing method and device and base station |
-
2002
- 2002-02-15 DE DE60210918T patent/DE60210918T2/en not_active Expired - Lifetime
- 2002-02-15 EP EP02003558A patent/EP1341350B1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
DE60210918T2 (en) | 2006-09-14 |
EP1341350A1 (en) | 2003-09-03 |
DE60210918D1 (en) | 2006-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101021566B1 (en) | Mechanisms to provide quality of service to the network using priority and reserved bandwidth protocols | |
KR101172491B1 (en) | System and method for enhancing network quality of service | |
US6839767B1 (en) | Admission control for aggregate data flows based on a threshold adjusted according to the frequency of traffic congestion notification | |
EP2122940B1 (en) | Proxy-based signaling architecture for streaming media services in a wireless communication system | |
US7529250B2 (en) | Adaptive ethernet switch system and method | |
US20090059937A1 (en) | Network system for guarantee QoS | |
US20190149475A1 (en) | Unified streamlining for data traffic | |
US10637792B2 (en) | Real-time analysis of quality of service for multimedia traffic in a local area network | |
EP1341350B1 (en) | A method for congestion detection for IP flows over a wireless network | |
Velmurugan et al. | Comparison of queuing disciplines for differentiated services using OPNET | |
Sisalem et al. | The direct adjustment algorithm: A TCP-friendly adaptation scheme | |
El-Marakby et al. | Towards managed real-time communications in the Internet environment | |
CN111224884B (en) | Processing method for congestion control, message forwarding device and message receiving device | |
Cisco | Implementing a Wide Area Network | |
Yuan et al. | Design and implementation of scalable edge-based admission control | |
JP2004241835A (en) | Reception discrimination method to transfer quality assurance type data stream, closed ip network, and program thereof | |
Vogt | Admission control and resource reservation on the internet | |
Engan et al. | Selective truncating internetwork protocol: experiments with explicit framing | |
Magalhães | A* transport layer approach to host mobility | |
JPH11331257A (en) | Method for interconnecting different networks and router | |
Zou et al. | Throughput models for SCTP with parallel subflows | |
Vu et al. | Dynamic packet size mechanism (DPSM) for multimedia in wireless networks | |
Kudo et al. | Proposal of cross‐layer bandwidth assignment with buffer size indication for TCP flow control | |
Grewal et al. | A framework for quality of service in wireless networks | |
Peng et al. | A multimedia transmission control algorithm based on cross-layer design in UMTS networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
17P | Request for examination filed |
Effective date: 20030930 |
|
17Q | First examination report despatched |
Effective date: 20040326 |
|
AKX | Designation fees paid |
Designated state(s): DE FI FR GB IT SE |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SONY DEUTSCHLAND GMBH |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SONY DEUTSCHLAND GMBH |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SONY DEUTSCHLAND GMBH |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): DE FI FR GB IT SE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED. Effective date: 20060426 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060426 |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REF | Corresponds to: |
Ref document number: 60210918 Country of ref document: DE Date of ref document: 20060601 Kind code of ref document: P |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20060726 |
|
ET | Fr: translation filed | ||
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20070129 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20110302 Year of fee payment: 10 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20121031 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20120229 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20130218 Year of fee payment: 12 Ref country code: DE Payment date: 20130219 Year of fee payment: 12 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60210918 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R079 Ref document number: 60210918 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0012560000 Ipc: H04L0012841000 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20140215 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 60210918 Country of ref document: DE Effective date: 20140902 Ref country code: DE Ref legal event code: R079 Ref document number: 60210918 Country of ref document: DE Free format text: PREVIOUS MAIN CLASS: H04L0012560000 Ipc: H04L0012841000 Effective date: 20141020 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140902 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140215 |